Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe
-
Size
180KB
-
MD5
355e874600855f9bf304b72ccdd34240
-
SHA1
3527e1ed4562dfddcc62eabd6162e5ac16ca7409
-
SHA256
4ff4b137e5699132c4e1dc0dbf4e5a438384d0dcf5274a8bbaa2fef294e56b72
-
SHA512
81f383ffc191c50d51824ff549f394304719868d1c483eeb63fb2bffa0331ea33f63d363fca014b26c57ed295834cce43d8b03efee605b79dffa70327770e873
-
SSDEEP
3072:jEGh0oilfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGgl5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{140E6455-DC27-434e-9451-3D9A7A791050}\stubpath = "C:\\Windows\\{140E6455-DC27-434e-9451-3D9A7A791050}.exe" {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33AE6A4C-9801-4646-B76C-F4ABB0D21E27} {140E6455-DC27-434e-9451-3D9A7A791050}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C29E692-E036-4090-8016-5D80C5FB998E} {7E276D32-A514-4155-8876-08BD965285C1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C29E692-E036-4090-8016-5D80C5FB998E}\stubpath = "C:\\Windows\\{0C29E692-E036-4090-8016-5D80C5FB998E}.exe" {7E276D32-A514-4155-8876-08BD965285C1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B939051-7521-45ea-981B-4A66E4C987AB}\stubpath = "C:\\Windows\\{8B939051-7521-45ea-981B-4A66E4C987AB}.exe" {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72A32022-0B4B-4c2b-8F73-F0717791C59D}\stubpath = "C:\\Windows\\{72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe" {9511F70C-6553-4306-8253-DF062C00A94B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{140E6455-DC27-434e-9451-3D9A7A791050} {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33AE6A4C-9801-4646-B76C-F4ABB0D21E27}\stubpath = "C:\\Windows\\{33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe" {140E6455-DC27-434e-9451-3D9A7A791050}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}\stubpath = "C:\\Windows\\{3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe" {33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7541893-7F3F-4ff1-AFDE-238F7A3F64B4} {691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E03D7A9-89F8-45cb-A4AA-7A74E7F67236} {0C29E692-E036-4090-8016-5D80C5FB998E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}\stubpath = "C:\\Windows\\{6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe" {0C29E692-E036-4090-8016-5D80C5FB998E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B939051-7521-45ea-981B-4A66E4C987AB} {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}\stubpath = "C:\\Windows\\{A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}.exe" {691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72A32022-0B4B-4c2b-8F73-F0717791C59D} {9511F70C-6553-4306-8253-DF062C00A94B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{691A8079-7D12-4d80-8297-37CB28EDCE8B} {3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9511F70C-6553-4306-8253-DF062C00A94B}\stubpath = "C:\\Windows\\{9511F70C-6553-4306-8253-DF062C00A94B}.exe" {8B939051-7521-45ea-981B-4A66E4C987AB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A88B4FA-8920-4cb8-99E0-1AB6A12D496F} {33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{691A8079-7D12-4d80-8297-37CB28EDCE8B}\stubpath = "C:\\Windows\\{691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe" {3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E276D32-A514-4155-8876-08BD965285C1} 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E276D32-A514-4155-8876-08BD965285C1}\stubpath = "C:\\Windows\\{7E276D32-A514-4155-8876-08BD965285C1}.exe" 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9511F70C-6553-4306-8253-DF062C00A94B} {8B939051-7521-45ea-981B-4A66E4C987AB}.exe -
Deletes itself 1 IoCs
pid Process 2100 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 1144 {33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe 1716 {3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe 2996 {691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe 2268 {A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe {9511F70C-6553-4306-8253-DF062C00A94B}.exe File created C:\Windows\{140E6455-DC27-434e-9451-3D9A7A791050}.exe {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe File created C:\Windows\{33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe {140E6455-DC27-434e-9451-3D9A7A791050}.exe File created C:\Windows\{A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}.exe {691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe File created C:\Windows\{7E276D32-A514-4155-8876-08BD965285C1}.exe 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe File created C:\Windows\{9511F70C-6553-4306-8253-DF062C00A94B}.exe {8B939051-7521-45ea-981B-4A66E4C987AB}.exe File created C:\Windows\{8B939051-7521-45ea-981B-4A66E4C987AB}.exe {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe File created C:\Windows\{3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe {33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe File created C:\Windows\{691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe {3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe File created C:\Windows\{0C29E692-E036-4090-8016-5D80C5FB998E}.exe {7E276D32-A514-4155-8876-08BD965285C1}.exe File created C:\Windows\{6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe {0C29E692-E036-4090-8016-5D80C5FB998E}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0C29E692-E036-4090-8016-5D80C5FB998E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8B939051-7521-45ea-981B-4A66E4C987AB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {140E6455-DC27-434e-9451-3D9A7A791050}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E276D32-A514-4155-8876-08BD965285C1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9511F70C-6553-4306-8253-DF062C00A94B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe Token: SeIncBasePriorityPrivilege 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe Token: SeIncBasePriorityPrivilege 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe Token: SeIncBasePriorityPrivilege 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe Token: SeIncBasePriorityPrivilege 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe Token: SeIncBasePriorityPrivilege 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe Token: SeIncBasePriorityPrivilege 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe Token: SeIncBasePriorityPrivilege 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe Token: SeIncBasePriorityPrivilege 1144 {33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe Token: SeIncBasePriorityPrivilege 1716 {3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe Token: SeIncBasePriorityPrivilege 2996 {691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2640 wrote to memory of 3024 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 30 PID 2640 wrote to memory of 3024 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 30 PID 2640 wrote to memory of 3024 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 30 PID 2640 wrote to memory of 3024 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 30 PID 2640 wrote to memory of 2100 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 31 PID 2640 wrote to memory of 2100 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 31 PID 2640 wrote to memory of 2100 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 31 PID 2640 wrote to memory of 2100 2640 2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe 31 PID 3024 wrote to memory of 2836 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 32 PID 3024 wrote to memory of 2836 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 32 PID 3024 wrote to memory of 2836 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 32 PID 3024 wrote to memory of 2836 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 32 PID 3024 wrote to memory of 2176 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 33 PID 3024 wrote to memory of 2176 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 33 PID 3024 wrote to memory of 2176 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 33 PID 3024 wrote to memory of 2176 3024 {7E276D32-A514-4155-8876-08BD965285C1}.exe 33 PID 2836 wrote to memory of 2548 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 34 PID 2836 wrote to memory of 2548 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 34 PID 2836 wrote to memory of 2548 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 34 PID 2836 wrote to memory of 2548 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 34 PID 2836 wrote to memory of 2512 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 35 PID 2836 wrote to memory of 2512 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 35 PID 2836 wrote to memory of 2512 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 35 PID 2836 wrote to memory of 2512 2836 {0C29E692-E036-4090-8016-5D80C5FB998E}.exe 35 PID 2548 wrote to memory of 2968 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 36 PID 2548 wrote to memory of 2968 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 36 PID 2548 wrote to memory of 2968 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 36 PID 2548 wrote to memory of 2968 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 36 PID 2548 wrote to memory of 1660 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 37 PID 2548 wrote to memory of 1660 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 37 PID 2548 wrote to memory of 1660 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 37 PID 2548 wrote to memory of 1660 2548 {6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe 37 PID 2968 wrote to memory of 1876 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 38 PID 2968 wrote to memory of 1876 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 38 PID 2968 wrote to memory of 1876 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 38 PID 2968 wrote to memory of 1876 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 38 PID 2968 wrote to memory of 2260 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 39 PID 2968 wrote to memory of 2260 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 39 PID 2968 wrote to memory of 2260 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 39 PID 2968 wrote to memory of 2260 2968 {8B939051-7521-45ea-981B-4A66E4C987AB}.exe 39 PID 1876 wrote to memory of 2720 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 40 PID 1876 wrote to memory of 2720 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 40 PID 1876 wrote to memory of 2720 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 40 PID 1876 wrote to memory of 2720 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 40 PID 1876 wrote to memory of 1680 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 41 PID 1876 wrote to memory of 1680 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 41 PID 1876 wrote to memory of 1680 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 41 PID 1876 wrote to memory of 1680 1876 {9511F70C-6553-4306-8253-DF062C00A94B}.exe 41 PID 2720 wrote to memory of 2560 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 42 PID 2720 wrote to memory of 2560 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 42 PID 2720 wrote to memory of 2560 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 42 PID 2720 wrote to memory of 2560 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 42 PID 2720 wrote to memory of 1060 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 43 PID 2720 wrote to memory of 1060 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 43 PID 2720 wrote to memory of 1060 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 43 PID 2720 wrote to memory of 1060 2720 {72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe 43 PID 2560 wrote to memory of 1144 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 44 PID 2560 wrote to memory of 1144 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 44 PID 2560 wrote to memory of 1144 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 44 PID 2560 wrote to memory of 1144 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 44 PID 2560 wrote to memory of 2460 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 45 PID 2560 wrote to memory of 2460 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 45 PID 2560 wrote to memory of 2460 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 45 PID 2560 wrote to memory of 2460 2560 {140E6455-DC27-434e-9451-3D9A7A791050}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_355e874600855f9bf304b72ccdd34240_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\{7E276D32-A514-4155-8876-08BD965285C1}.exeC:\Windows\{7E276D32-A514-4155-8876-08BD965285C1}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{0C29E692-E036-4090-8016-5D80C5FB998E}.exeC:\Windows\{0C29E692-E036-4090-8016-5D80C5FB998E}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exeC:\Windows\{6E03D7A9-89F8-45cb-A4AA-7A74E7F67236}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\{8B939051-7521-45ea-981B-4A66E4C987AB}.exeC:\Windows\{8B939051-7521-45ea-981B-4A66E4C987AB}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\{9511F70C-6553-4306-8253-DF062C00A94B}.exeC:\Windows\{9511F70C-6553-4306-8253-DF062C00A94B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\{72A32022-0B4B-4c2b-8F73-F0717791C59D}.exeC:\Windows\{72A32022-0B4B-4c2b-8F73-F0717791C59D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\{140E6455-DC27-434e-9451-3D9A7A791050}.exeC:\Windows\{140E6455-DC27-434e-9451-3D9A7A791050}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\{33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exeC:\Windows\{33AE6A4C-9801-4646-B76C-F4ABB0D21E27}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\{3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exeC:\Windows\{3A88B4FA-8920-4cb8-99E0-1AB6A12D496F}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\{691A8079-7D12-4d80-8297-37CB28EDCE8B}.exeC:\Windows\{691A8079-7D12-4d80-8297-37CB28EDCE8B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\{A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}.exeC:\Windows\{A7541893-7F3F-4ff1-AFDE-238F7A3F64B4}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{691A8~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A88B~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33AE6~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{140E6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72A32~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9511F~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B939~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E03D~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C29E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E276~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD547748315281c4a03d7f23d458fc944b9
SHA1fee7f9336ec6344ae7429b901bec8412123955dd
SHA2562430363ad32cfacbabd2d3e7259cc96384b30842205139d96a70bb4ed5229abd
SHA512b339c16a702eb24810d9dae77d8e95da5c97fe0f754103eeeda6a9bfef5ba1e81a0995f81afd7f58fb08207990ec73e6589277c8fc14cc353f497fb65d69a310
-
Filesize
180KB
MD53c5aaee9a402a951a4d645cce0a63c8c
SHA18fbfc72edfa86da39f3628fa0401081c62f73b35
SHA2560984285778af60314c739fc962b062b724db9b6198edde611645fa0d0f4691a0
SHA512decd1994bb77b1166c031d433d17544b13f6e2e9a4499993a9c3de42562c00afd4ea91b328a171ac89e51ba2b4b71c454d5707acf8dbefeedaf7d1b4d8af3f1f
-
Filesize
180KB
MD5a896f09fdfdf60c67ae7cd2b06bcf478
SHA1bad922ec10d74f111771b0889dc99ec6deaf8080
SHA256dae8e73ad85b9db4ca2d24f7e3d3206a5e3122480971e13fb3e1db371823aec0
SHA51236137dea3ea8ac54d083de91d6aafdcdb953d0fc5a0ac1a497878471eaef2a38e84644168175325663aabc8280653a8d94ee9cd2c93c2d83f3fd7153e826d2e6
-
Filesize
180KB
MD5c7442d3a1f8dd457eaf58503b7c5b604
SHA115592ec58bb0ae8c0c40505ce47658f6d3cd195d
SHA256200c8fe219b3f27ccee9e56f63c0b20f51d3e97abcc25777fb9949ce03f56f77
SHA5122cec2cbe8c076226f97c61e620f984f478bdbcf00255a2e57bd76107a1ea17c6431016471ae89bebff27ad0b415e92e0158a79a94094724e1258c44fd66df163
-
Filesize
180KB
MD57b198dd41752ff3369e6d5d0162c3f3a
SHA18db7ce8249112955f43301ffe3ade6718661859c
SHA2569a6176a1510714c74dfe61affda20c58b9c2ed5b96d5996dec2803f2a7f4f1e9
SHA512c7bd5412397797ac2dfba70ac8c6caf95b236161ccbe0485ed03daf081aa6220d41fb59de2a6d028101973901a3518bcaef240e9a9f262ff97d76669301f2766
-
Filesize
180KB
MD525748cfa2e0941d9f4de5616745ed746
SHA12d953c33f583bda9f321f0077f8b5484aa57939e
SHA256d126c684420362fa4d5c593f8ed2164079c7e0743a23202970731740d9318973
SHA512d539049cf1cf970c26aa6c278e4a5459eb8dc98071bd6085f9d6065f01a8c4e7243ca1589f342ee4cb2b08180e5ee3fb511ce554ff1ee9fc7c24355a47f1f746
-
Filesize
180KB
MD54e694e55aabf3f8e9986483b2931d839
SHA19df8efbb7b65d3df290807b73a5a135609733f9a
SHA25676d8b2691c771a7c0f3935b2b5bce0d7a61ba759d5410a6c9132bfc3928d1f1a
SHA51242f981a1105fae00e12741a260a3a2e417a8e58d01b573e7ac10a50f7d56940d8822493dd9b383078bf6330aee3e7ca019dfdcd9b894cc450d191538a52fa8e1
-
Filesize
180KB
MD596d94eb4b937442894c5c8fe1b8d1f56
SHA1bfef69ce67645b9aa3a9dad116546e3e960cd385
SHA256871ae987d9f608f3bf18e94293caba3539ea2235e1e4604bc2ae7b3db9552f72
SHA51235961b1cd41fc7aa5596bf86ac244b1e04ade7f5fe21fd64e86e60d2b148f37947858aebb17ddb473270e63e4917695634de202a954a9418d31349573575d194
-
Filesize
180KB
MD5c17efdeb92ec320b454ec437b3cb4791
SHA1e001d6e8f08fdbd4589093f5e598130c1450aade
SHA256e13251df81cd42cdecf941b009f8cef134ca5f664a5a6d8de87b1741d176ccce
SHA512c67f46211b33fd682d3f06eb676c111d1d985b323cec952b5512d477e802b9c6886e9cb9c52a4fef29a313123cd3f5e9fdbf563990243d46a7a086dd2f415347
-
Filesize
180KB
MD55890c99318819d7f4741f077bc7b8a33
SHA12f022c02eec8989c25bc47869dc9cdfe481a975b
SHA256cdfba6fb748751e1b3a293781cb333b7f452776c8b483272b2995059092c7797
SHA5125c99361d13ce9ca7308acf98fc59258cb7444fa0921f3754c17352aa45bbbf55e799badeb515545da2d1ba835687235715558180fed2d3d56af71e3dea8afc65
-
Filesize
180KB
MD54a3fd334680be883c19da06f60cb67c8
SHA124b9bf6f56bce414665ab429720eafaeddca7324
SHA256a0a6689c4694d8d8dae2c66c67cf6aabdf1f5bd7d33f29e37afdafd373a0ef56
SHA512ac33dc48b23e6f4ad65310d4a93ce1baf028b1919d1a36a4fa36e316140a9a66f4462dca21812da4b9d915e6327e8da95910f9477054e5dcdb0491fd7fc59c4e